• 34 Posts
  • 97 Comments
Joined 1 年前
cake
Cake day: 2023年7月29日

help-circle


















  • I am fairly new to this community, so I have no official say. But has Core considered distributing Monero binaries via Nostr, IPFS, Arweave, akash, Session, or other decentralized means? This would allow for more decentralization of staff and censorship resistance than a credit card government domain. Also could be both. just more options. And then different core members could do the different official channels, which would quickly raise alarm bells if Nostr has a different binary than getmonero.org



  • You’re correct that UDP is not “suspicious”, but it is easier to track from an ISP that a VPN is being used. The video stressed that this was a risk for those concerned with censorship from the ISP for using a VPN. Even the WireGuard official website says this is not ideal for obfuscation.

    Regarding the VPN→Tor, it places a greater level of trust on the VPN provider to properly implement WireGuard key rotation. If the VPN provider is using a dedicated server, such as Mullvad, then that’s great. Other VPN providers are shady and use VM clouds from popular datacenters. Cloud computing shares RAM resources and thus it’s keeping in memory longer the association. It’s also possible that the same datacenter can be hosting a Tor node and a VPN. Many VPNs use the same third party datacenters. It’s not that WireGuard is inherently insecure, it’s that there is no benefit to using during Tor for increased risk. And these increased risks all revolve around more trust.






  • The issue with WireGuard depends on your situation. So for low risk activities such as watching a Netflix video, it’s fine. It’s faster and convenience. However, people should be aware of the trade-offs associated with this:

    There’s logging of IPs built into the identity of the users, such that it stores it in memory after the connection is closed. This is NOT an issue for low risk activity like video games, but IS an issue for Tor users as they change circuits every 10 minutes. Frequently VPN companies outsource their servers to the same third party servers as Tor VPS hosts and as other VPNs. For example, some well known VPNs, Mullvad and IVPN do share some of the same third party providers. And other providers don’t have dedicated servers and use cloud VMs. Keeping your IP in memory from one Tor circuit to another with the same servers providers is a huge risk especially if it involves cloud hosting as it’s shared memory. Depending on the VPS or provider, it could overlap. The video further explains that there is no speed benefit to using WireGuard over OpenVPN with Tor. So you get no bonus for the risk.

    There was other stuff covered in the video regarding UDP packets being more obvious to the ISP for a VPN useage, and the potential to put that through a UDP→TCP tunnel with a link to where to find that.

    Future videos will have me in a smaller box in the corner, and larger graphics